ABSTRACT: With the increasing popularity of cloud-based data services, data proprietors are highly motivated to store their huge amount of potentially sensitive personal data files on remote servers in encoded form. Customers later can query over the encrypted database to retrieve files while protecting the privacy of both the queries and the database, by permitting some reasonable […]
.NET MINI PROJECTS
IFS01-Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing
ABSTRACT: Secure document storage and retrieval are one of the hottest research headings in cloud computing. Despite the fact that many searchable encryption plans have been proposed, few of them bolster effective retrieval over the documents which are encrypted based of their attributes. In this project, a hierarchical attribute-based encryption scheme is first designed for […]
KDE07-PrivateGraph: Privacy-Preserving Spectral Analysis of Encrypted Graphs in the Cloud
ABSTRACT: With the wide deployment of public clouds, proprietors of big graphs need to utilize the cloud to deal with the scalability issues. However, the privacy and ownership for graphs in the cloud has turned into a major concern. In this project, we examine privacy-preserving algorithms for graph spectral analysis of outsourced encrypted graph in […]
KDE06-Secure and Efficient Skyline Queries on Encrypted Data-knowledge
ABSTRACT: Outsourcing data to cloud server gives a cost-effective way approach to support large-scale data storage and query processing. Be that as it may, because of security and privacy concerns, sensitive information (e.g., medical records) should be protected from the cloud server and other unauthorized clients. One approach is to outsource encrypted data to the cloud server […]
KDE05-DeepClue: Visual Interpretation of Text-based Deep Stock Prediction-knowledge
ABSTRACT: The recent advance of deep learning has enabled trading algorithms to predict stock value developments all the more accurately. Unfortunately, there is a critical gap in the real-world deployment of this breakthrough. This project presents DeepClue, a system develop to connect text-based deep learning models and end clients through visually interpreting the key elements learned […]
KDE04-Location Inference for Non-geotagged Tweets in User Timelines
ABSTRACT: As social media clients are increasingly going mobile, different location based Services (LBS) have been sent via web-based social media like Twitter. The success of them heavily relies upon the availability and accuracy of clients’ location data. Be that as it may, just a little fraction of tweets are geo-tagged. In this way, it […]
KDE03-Modeling and Predicting Community Structure Changes in Time-Evolving Social Networks
ABSTRACT: As time evolves, a community in a social network may experience different changes known as critical events. For example, a community can either split into a few different communities, project into a larger community, shrink to a smaller community, remain stable or merge into another network. Prediction of critical events has attracted in expanding […]
KDE02-A New Robust Approach for Reversible Database Watermarking With Distortion Control
ABSTRACT: These days information is crucial in numerous fields, for example, such as, medicine, science, and business, where databases are utilized effectively for data sharing. In any case, the databases face the risk of being pirated, stolen or abused, which may bring about a lot of security threats concerning proprietorship rights, data tempering and privacy protection. […]
PDC01-Budget and Deadline Aware e-Science Workflow Scheduling in Clouds
ABSTRACT: Essential science is becoming ever more computationally intensive, expanding the requirement for large-scale compute and storage resources, be they inside a High-Performance Computer cluster, or most recently within the cloud. As a rule, the large-scale scientific calculation is represented to as a workflow for planning and runtime provisioning. Such planning turns into a much additionally challenging […]
MC02-Dynamic Connectivity Establishment and Cooperative Scheduling for QoS-Aware Wireless Body Area Networks
ABSTRACT: In a hospital environment, the total number of Wireless Body Area Network (WBAN) equipped patients asking ubiquitous healthcare services benefits in an area increments fundamentally. Along these lines, increased traffic load and group-based mobility of WBANs degrades the execution of each WBAN fundamentally, concerning service delay and network throughput. What’s more, the mobility of […]